Picture for Azqa Nadeem

Azqa Nadeem

SoK: Explainable Machine Learning for Computer Security Applications

Add code
Aug 22, 2022
Figure 1 for SoK: Explainable Machine Learning for Computer Security Applications
Figure 2 for SoK: Explainable Machine Learning for Computer Security Applications
Figure 3 for SoK: Explainable Machine Learning for Computer Security Applications
Figure 4 for SoK: Explainable Machine Learning for Computer Security Applications
Viaarxiv icon

SECLEDS: Sequence Clustering in Evolving Data Streams via Multiple Medoids and Medoid Voting

Add code
Jun 24, 2022
Figure 1 for SECLEDS: Sequence Clustering in Evolving Data Streams via Multiple Medoids and Medoid Voting
Figure 2 for SECLEDS: Sequence Clustering in Evolving Data Streams via Multiple Medoids and Medoid Voting
Figure 3 for SECLEDS: Sequence Clustering in Evolving Data Streams via Multiple Medoids and Medoid Voting
Figure 4 for SECLEDS: Sequence Clustering in Evolving Data Streams via Multiple Medoids and Medoid Voting
Viaarxiv icon

Robust Attack Graph Generation

Add code
Jun 15, 2022
Figure 1 for Robust Attack Graph Generation
Figure 2 for Robust Attack Graph Generation
Figure 3 for Robust Attack Graph Generation
Figure 4 for Robust Attack Graph Generation
Viaarxiv icon

SAGE: Intrusion Alert-driven Attack Graph Extractor

Add code
Jul 06, 2021
Figure 1 for SAGE: Intrusion Alert-driven Attack Graph Extractor
Figure 2 for SAGE: Intrusion Alert-driven Attack Graph Extractor
Figure 3 for SAGE: Intrusion Alert-driven Attack Graph Extractor
Figure 4 for SAGE: Intrusion Alert-driven Attack Graph Extractor
Viaarxiv icon